Publications

Publications

Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
Language: English
[Conference Proceedings]


Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
Language: English
[Conference Proceedings]


Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
Language: English
[Conference Proceedings]


Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
HotNets '18: 17th ACM Workshop on Hot Topics in Networks
Language: English
[Conference Proceedings]


Parsing and Extracting Features from OPC Unified Architecture in Industrial Environments
Hormann, Ricardo; Nikelski, Sebastian; Dukanovic, Sinisa; Fischer, Eric
International Symposium on Computer Science and Intelligent Control (ISCSIC) 2, 2018, Stockholm>
Language: English
[Conference Paper]


Little Brother is Watching - We know all your Secrets!
Rasthofer, Siegfried; Huber, Stephan; Arzt, Steven
Conference "Virusbulletin" (VB) 2018, Montreal>
Language: English
[Conference Paper, Electronic Publication]


Caring for IT Security: Accountabilities, Moralities, and Oscillations in IT Security Practices
Kocksch, Laura; Korn, Matthias; Poller, Andreas; Wagenknecht, Susann
Conference on Computer-Supported Cooperative Work and Social Computing (CSCW) 21, 2018, New York/NY>
Language: English
[Journal Article, Conference Paper]


Workshops der INFORMATIK 2018. Architekturen, Prozesse, Sicherheit und Nachhaltigkeit: 26.-27. September 2018, Berlin, Deutschland, CD-ROM
Czarnecki, Christian; Brockmann, Carsten; Sultanow, Eldar; Koschmider, Agnes; Selzer, Annika ; Gesellschaft für Informatik -GI-, Bonn
Workshop "Informatik" 2018, Berlin>
Language: English
[Conference Proceedings, Electronic Publication]


Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) 2018, Toronto>
Language: English
[Conference Paper]


Efficient Side-Channel Protections of ARX Ciphers
Jungk, Bernhard; Petri, Richard; Stöttinger, Marc
Conference on Cryptographic Hardware and Embedded Systems (CHES) 2018, Amsterdam>
Language: English
[Journal Article, Conference Paper, Electronic Publication]


Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Workshop on Hot Topics in Networks (HotNets) 17, 2018, Redmond/Wash.>
Language: English
[Conference Paper]


Towards a Cloud-based System for Software Protection and Licensing
Schaad, Andreas; Grohmann, Bjoern; Winzenried, Oliver; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, p.698-702
Language: English
[Conference Proceedings]


Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data
Ulmer, Alex; Schufrin, Marija; Sessler, David; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 15, 2018, Berlin>
Language: English
[Conference Paper]


CrazyFaces: Unassisted Circumvention of Watchlist Face Identification
Damer, Naser; Wainakh, Yaza; Boller, Viola; Berken von den, Sven; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 9, 2018, Redondo Beach/Calif.>
Language: English
[Conference Paper]


MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) 9, 2018, Redondo Beach/Calif.>
Language: English
[Conference Paper]


‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes
Zimmermann, Verena; Bennighof, Merve; Edel, Miriam; Hofmann, Oliver; Jung, Judith; Wick, Melina von
Mensch und Computer 2018 - Workshopband
Language: English
[Conference Proceedings]


The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
Language: English
[Conference Proceedings]


Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
Language: English
[Conference Proceedings]


Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Workshop on Hot Topics in Networks (HotNets) 17, 2018, Redmond/Wash.>
Language: English
[Conference Paper]


Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
Language: English
[Conference Proceedings]


The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
Language: English
[Conference Proceedings]


Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
Language: German
[Conference Proceedings]


Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Habib, Sheikh Mahbub; Alexopoulos, Nikolas; Islam, Monirul; Heider, Jens; Marsh, Stephen; Mühlhäuser, Max
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 17, 2018, New York/NY>
Language: English
[Conference Paper]


One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Language: English
[Conference Proceedings]


Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Language: English
[Conference Proceedings]


The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
Language: German
[Conference Proceedings]


Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
International Conference of Computer and Information Technology (ICCIT) 20, 2017, Dhaka>
Language: English
[Conference Paper]


Cross-domain authorship attribution based on compression: Notebook for PAN at CLEF 2018
Halvani, Oren; Graner, Lukas
Conference and Labs of the Evaluation Forum (CLEF) 2018, Avignon>
Language: English
[Conference Paper, Electronic Publication]


Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Great Lakes Symposium on VLSI (GLSVLSI) 28, 2018, Chicago/Ill.>
Language: English
[Abstract, Conference Paper]


Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
Language: English
[Conference Proceedings]